SlideShare uma empresa Scribd logo
1 de 14
Baixar para ler offline
Secur communications for all




                                        The Genesis Key, Inc.
                                         Presentation for Consumers
                                                       November, 2009




The Genesis Key, Inc.                                    Confidential
SecurDigital, Inc.




”SecurDigital has upped the ante considerably here. In a sudden leap, this innovative new product has
shaken off the complexity of unified communications and has taken the lead in terms of ease of use,
security and interoperability. Starting with simple encryption techniques in a Java-based application,
SecurDigital has introduced SecurVoice© Privacy Edition, a next-gen secure digital data transmission
solution, which takes the focus away from hardware or firmware centric smartphone offerings and
provides a Solution that is application platform, operating system, device and carrier independent.

SecurVoice delivers encrypted voice, data or video transmission from any device to any device(s), with
selectable encryption algorithms - allowing any companies to literally deploy “Secur Communications”.

                                                                                  Bruce F. Magown, CEO
                                                                                        SecurDigital, Inc.




The Genesis Key, Inc.                                                                            Confidential
Do I need Security for my Cell phone?

•      Would you mind if you knew someone was listening to all of your calls on your home phone?
•      Did you know that your cell can be turned on in the off position and the microphone will pick up your private conversations at
       home?
•      Did you know that your phone is sending its signal numbers out to wireless towers 24/7?
•      Did you know the only way to shut down your cell phone is to pull out the battery?
•      Did you know that our government listens to every cell conversation on Route #95?
•      Did you know that if you put your bank or credit card number into your cell that it stays there forever? All information the
       phone receives s put on record. There is no way to dump that info.
•      If you are leading a Company or responsible for other peoples money that information buck stops with you, for you to be a
       secure source.
•      Did you know that even the Bluetooth ear bud could be listened to with a scanner? Imagine someone standing in the street
       with a hidden scanner and transmitter you are most intimate calls can and are being routed to the internet, especially You-
       Tube.
•      Did you know that most of the world is building their infrastructure on Maxi WiFi because it is less expensive and less time
       consuming to bury land cables? These citizens use their Phone for paying utilities and other bills over their cell phone.
•      Ask a young computer engineer still in college what does he do all his work on, a lap top or a cell phone, they will tell you
       that lap tops are from the stone age. They have phones that are more portable, less expensive and handle all pictures, and
       recordings, documents, letters and forms all installed in the cell phone…You need to see the world is changing in front of
       your eyes.
•      That person that says he does not see the need for personal cell security does not understand the world he is living in
       today…




The Genesis Key, Inc.                                                                                                          Confidential
Disclaimer

This presentation serves marketing purposes only. This presentation is made by The Genesis Key, Inc. (the "Company") solely for use at the road show presentation held in
connection with the offering of shares of the Company and is strictly confidential. It is furnished to you solely for your information and may not be copied, distributed or otherwise
made available to any other person by any recipient. Neither this presentation nor any copy of it may be taken or transmitted outside the United States or distributed outside the
United States. Any failure to comply with this restriction may constitute a violation of the U.S. securities laws. The distribution of this document in other jurisdictions may also be
restricted by law, and persons into whose possession this presentation comes should inform themselves about, and observe, any such restrictions. The facts and information
contained herein are as up to date as is reasonably possible and are subject to revision in the future. None of the Company, Vantage Investment Group, Inc. or any of their
parents or subsidiaries or any of such person's directors, officers, employees or advisors nor any other person makes any representation or warranty, express or implied as to,
and no reliance should be placed on, the accuracy or completeness of the information contained in this presentation. None of the Company, Vantage Investment Group, Inc. or
any of their parents or subsidiaries or any of their directors, officers, employees and advisors nor any other person shall have any liability whatsoever for any loss howsoever
arising, directly or indirectly, from any use of this presentation. The same applies to information contained in other material made available at the presentation. While all
reasonable care has been taken to ensure the facts stated herein are accurate and that the opinions contained herein are fair and reasonable, this document is selective in
nature and is intended to provide an introduction to, and overview of, the business of the Company. Where any information and statistics are quoted from any external source,
such information or statistics should not be interpreted as having been adopted or endorsed by the Company as being accurate.

This presentation contains forward-looking statements relating to the business, financial performance and results of the Company and/or the industry in which the Company
operates. These statements generally are identified by words such as "believes," "expects," "predicts," "intends," "projects," "plans," "estimates," "aims," "foresees," "anticipates,“
"targets," and similar expressions. The forward-looking statements, including but not limited to assumptions, opinions and views of the Company or information from third party
sources, contained in this presentation are based on current plans, estimates, assumptions and projections and involve uncertainties and risks. Various factors could cause actual
future results, performance or events to differ materially from those described in these statements. None of the Company or Vantage Investment Group, Inc. guarantees that the
assumptions underlying such forward-looking statements are free from errors nor do they accept any responsibility for the future accuracy of the opinions expressed in this
presentation. No obligation is assumed to update any forward-looking statements. By accepting this presentation you acknowledge that you will be solely responsible for your own
assessment of the market and of the market position of the Company and that you will conduct your own analysis and be solely responsible for forming your own view of the
potential future performance of the Company's business. This presentation does not constitute an offer or invitation to subscribe for, or purchase, any shares or other securities of
the Company and neither this presentation nor anything contained herein shall form the basis of, or be relied on in connection with, any offer or commitment whatsoever in any
jurisdiction in which such solicitation, offer or sale would be unlawful, nor shall part, or all, of these materials form the basis of, or be relied on in connection with, any contract or
investment decision in relation to any securities. In particular, this presentation is not an offer for sale of securities in the United States. Securities may not be offered or sold in the
United States absent registration or an exemption from registration under the U.S. Securities Act of 1933, as amended. Neither the Company nor any selling shareholder intends
to register any securities of the Company outside the United States or to conduct a public offering of securities in any jurisdiction other than the United States. This presentation
speaks as of September 14, 2009. Neither the delivery of this presentation nor any further discussions of the Company with any of the recipients shall, under any circumstances,
create any implication that there has been no change in the affairs of the Company since such date.




The Genesis Key, Inc.                                                                                                                                                           Confidential
Agenda




                        » Introduction
                        » Management Team
                        » Opportunity
                        » Solution
                        » Competition
                        » Pricing Model
                        » Summary




The Genesis Key, Inc.                       Confidential
Introduction

» The Genesis Key, Inc., incorporated on October 7, 2008, in Dover, Delaware as a ”C” corporation. The Executive
   Team has been working together on security solutions for four (4) years prior to SecurVoice© being developed as a
   need for one of those projects championed by Steve I. Cooper, former CIO for White House and DHS, and now CIO
   of the FAA.
» SecurVoice© target markets include; Banking, Financial Services and Brokerage Institutions, Attorney/Client
  privileged communications, the World Health Organization and HIPPA regulations for voice and data electronic
  transmission of patients health records between Hospitals, Doctors, Nurses and other long term Health providers,
  and now by law, the health monitoring systems needing secure communications to comply with Federal Regulations
  and Emergency Manager’s crisis coordination between all State and Local Police and Fire Departments. The
  company licenses using a SaaS or Enterprise software model with types for commercial or government.
» Sales of cell phones are on pace to reach a billion annually by the end of the decade, when nearly 40 percent of the
  world's population will own a mobile handset, according to a Gartner report. Asian countries will continue to play a
  major role in increasing the number of cell phones in circulation to 2.6 billion by 2009, the research firm estimated in
  the report. Currently, 25 percent of all cell phones are sold in Asian countries; by decade's end, that number will be
  one in three.
» Consumers today are unaware of threats to them as they use their smartphones. Personal conversations, data,
  banking and health information; all are available to undesirables if the consumer is not protected.
» Genesis Key is making secure communications technology available at a retail price point that is device, carrier,
  operating system and application platform independent to the general marketplace.
         Note: This is unique in the world today.




The Genesis Key, Inc.                                                                                             Confidential
Management Team
» The Genesis Key management and Advisors are comprised of experienced entrepreneurs and business
   professionals from the consumer, finance, technology, government and secure homeland industries. The
   management team possesses a breadth of functional experience in software product development, system and
   network integration, the marketing of emerging products, technologies, strategic partnering and corporate finance.

    Management and Board                                                           Advisors
    Bruce Magown, Founder, CEO, Treasurer                                          Steven Cooper is a partner and founding member of Strativest, LLC. He
                                                                                       previously held key, senior level technical and managerial information
              Mr. Magown is CEO of The Genesis Key, Inc., a multi-tenant
                                                                                       technology positions in both the private and public sectors. .
              integration platform for SaaS application which provides complete
                                                                                       In addition to 20 years experience in the private sector, Mr. Cooper
              integration Solutions – as a Service (www.interweave.biz).
                                                                                       served at the highest levels of the United States Government. In
              InterWeave integrates CRM, Finance, ERP, eCommerce,
                                                                                       2002, he was appointed as a special assistant to the President and
              Subscription-based billing and Telephony applications with Web
                                                                                       served as the senior director for information integration in the White
              Services Databases, etc., for customers in configurable form.
                                                                                       House Office of Homeland Security. This was followed in 2003 by his
              Additionally, Mr. Magown served as the Vice President of the
                                                                                       appointment as the first chief information officer at the newly formed
              Strategic Alliance of Sun/Netscape and built Netscape Professional
                                                                                       Department of Homeland Security. In this position, Mr. Cooper had
              Services to over $200m in four years.
                                                                                       responsibility for all information technology assets supporting 190,000
    Steve Garrett, Founder, Chairman of the Board, Secretary                           personnel and 22 agencies. .
              Mr. Garrett founded The Genesis Key, Inc. while working to solve     Norman Byers – Mr. Byers is the managing partner and a founding
              communication challenges for another business of his: PGC                member of Strativest, LLC. He formerly headed Byers Consulting, a
              Consortium (www.phoenixgenesiscorp.com). He brings over 40               Northern Virginia based consulting firm advising companies accessing
              years of deep business experience and being CEO of public                federal, state and local markets. Mr. Byers has extensive international
              companies. He has been involved in directing leading edge                business experience, having founded joint ventures in Asia and the
              technology Start-up Companies; providing Executive and Financial         Middle East and establishing numerous strategic partnerships
              Guidance, Marketing, and Sales Management, Corporate Strategic           throughout Europe, South America, Asia and the Middle East.
              Planning, Systems Organization, Security and Efficiency.             James McKay - Deputy Chief Financial Officer of the Justice Dept. & first
                                                                                      Inspector General of the ICC
                                                                                   Clifford Bragdon - Dean of Florida Institute of Technology and Chairman
                                                                                        of the Board of the Global Center of Preparedness
                                                                                   USAF Major General Eric Rosborg – Chief, Office of Defense
                                                                                      Cooperation Turkey, U.S. European Command, Ankara, Turkey,
                                                                                      retired. Managed all aspects of security assistance and security
                                                                                      cooperation programs necessary to sustain the military-to-military
                                                                                      relationship between the United States and Turkey.



The Genesis Key, Inc.                                                                                                                            Confidential
Opportunity
 » Smartphones are enjoying brisker than expected growth, according to a new report from Gartner. The
   firm's recently released "mobile terminals" market study projects that shipments of mobile phones in
   general will surpass 1 billion units in 2009, and that "Smartphones" will reach the 200 million mark one
   year earlier, in 2008.

      Gartner has boosted its previous projection for mobile phone sales in 2005
      "significantly" to 779 million units, according to Ben Wood, Research Vice President of
      Gartner for Mobile Terminals, a 16 percent increase over 2004. Among other
      projections, the report says that more than 100 million 3G phones will be sold in 2006,
      and that the Indian market to overtake the Chinese market in terms of annual sales in
      2009. As for the entire Asia/Pacific segment of the mobile phone market, it represents
      25 percent of the worldwide market today, Gartner says, predicting that this will
      increase to 33 percent by 2009.

      "The world's appetite for mobile phones has exceeded even the most optimistic
      expectations," said Wood. "Mobile phones could go on to be the most common
      consumer electronics devices on the planet." Gartner estimates there will be 2.6 billion
      mobile phones in use by the end of 2009.

      Smartphones fastest growing category
      "Smartphone sales broke all records in the first quarter of 2005 and we expect them to
      double year on year to 2006," says Roberta Cozza, principal analyst at Gartner. And a
      deeper analysis of the forecast, she explains, "shows that Smartphones are the fastest
      growing category of device.“

      According to Gartner, Windows Mobile Smartphones almost doubled their market
      share in Q1 2005 over Q1 2004, although that share is a minority one. Upwards of 76
      percent of Smartphones run the Symbian OS, according to Gartner, with Linux a
      distant second at around 14 percent, and Palm OS and Windows Mobile in a virtual tie
      with 4.6 and 4.5 percent, respectively.

                                                                                                 Operating System Adoption




The Genesis Key, Inc.                                                                                                        Confidential
Solution Overview

                        SecurVoice© is ultra-strong
                        encryption software.
                         The internal software on your
                         cell phone converts your voice
                         in real-time into encrypted data
                         which is then sent over your
                         carriers infrastructure to the
                         SecurVoice© Enterprise Server
                         where it is de-crypted.
                         It is then re-encrypted and sent
                         over your carrier’s infrastructure
                         the receiving cell phone where
                         it is de-crypted and is converted
                         back to voice.


                         SecurVoice© also features a
                         dual-layered encryption schema
                         which provides full protection
                         against covert listening devices.
                         You may select different
                         encryption algorithms.
                         For example, your outbound
                         conversation may be AES 128
                         encryption, while your callers
                         inbound conversation may be
                         elliptical curve; making listening
                         to your conversation impossible




The Genesis Key, Inc.                       Confidential
Solution Detail
» SecurVoice© Privacy Edition is a completely new wireless communication solution and architecture
  which provides secure communications interoperability with any cell, satellite, walkie-talkie, or VoIP
  phone system. You can download the 38k Java app from our secure locations world-wide and follow the
  simple instructions to install.

   How it Works                               Solution Overview                  Key Features
   The Java app communicates directly          ONE-TOUCH SWITCHING               • HIPPA compliant privacy-grade strong encryption
   with our SecurVoice© Enterprise Server      BETWEEN PRIVACY AND                 key (AES (128) asymmetric encryption) plus
   application as a hosted option or may       STANDARD COMMUNICATIONS             additional encryption combinations to provide a
   be resident on your servers.                                                    very unique Solution
                                               WMS AND VOIP SECURE
   Additionally, we provide internet virus                                       • Data is encrypted when it leaves the sending
                                               COMMUNICATION OPTION                device and is de-encrypted by the server. It is then
   and hacker protection with a firewall
                                               INTUITIVE, USER-FRIENDLY            re-encrypted (with possible other encryption
   from CyberSoft.
                                               INTERFACE                           selection) and sent to the receiving device and
   The solution is operating system,                                               decrypted
   application platform, device and carrier    AVAILABLE TO PURCHASE AND
                                                                         • Software only Solution. No additional hardware
   independent.                                DOWNLOAD ONLINE
                                                                                   required
                                               SOFTWARE BASED SOLUTION – • Implemented on regular smart phones and GSM
                                               NOT HARDWARE                cellular networks with circuit-switched data service
                                                                                 • Full duplex communications
                                                                                 • Superior audio quality and ultra low latency
                                                                                 • Resides on regular cell phones. Neither the
                                                                                   encryption process nor the device is perceived by
                                                                                   third parties
                                                                                 • The user may update the cell phone firmware or
                                                                                   operating system. The cell phone keeps all its
                                                                                   original features.



The Genesis Key, Inc.                                                                                                      Confidential
Solution Interoperability




             Complete Inter-operability. Device, Carrier, Application Platform & Operating System Independent

The Genesis Key, Inc.                                                                                    Confidential
Competition
» In our competitive market research, we have not found any comparative for “software only” secure
   communications solutions for data, voice and video. Potential competitors are typically in either “Hardware
   Specific” or “Firmware Specific” categories.

 http://www.koolspan.com/ Commercial type on hardware system
 The KoolSpan solution is available today in an Ethernet-based network appliance and client-side Smart Card that plugs into a USB port. Along
 with streamlined device integration capabilities, KoolSpan delivers a security architecture greatly reducing the effort required for user/network
 security administration. KoolSpan also is highly suitable for a large range of OEM and embedded systems supporting critical enterprise voice,
 wireless and data networking applications.
 http://www.cellcrypt.com/?gclid=CLzViqvJu5YCFQOcFQodXWyeKw Commercial type on hardware system
 Secure calls can be completed from one mobile device to another mobile device, between a mobile and a landline, or from landline to landline.
 The architecture requires all secure calls to be routed through a Cellcrypt Switch, which can be publicly or privately hosted. The calls passing
 through the switch are not decrypted, ensuring complete privacy.

 http://www.snapdefense.com/pages.php?module=15&cat=12&incat=0 Snapcell is a patented micro-adapter used for secure point-to-point
 cellular communications over any GSM frequency (850/900/1800/1900). Snapcell is compatible with popular Ericsson T-Series phones including
 T28, V800, K500i, T637 and several others. Attach Snapcell onto the handset and enjoy military-strength security at toll-voice quality!

 http://www.sigillu.com/index.html
 We are pleased to announce the 3rd generation of our secure phones, with improved audio quality, enhanced ultra low latency, and support for
 the most modern Nokia™ phones.

 http://www.gdc4s.com/content/detail.cfm?item=97aef0a4-96e4-4ab2-b33b-eb832c4bb4c2
 The Sectéra® Wireless GSM® Phone provides end-to-end high assurance secure voice and data communications for commercial GSM
 wireless networks operating in the 900/1800/1900 MHz bandwidths worldwide. The Sectéra Secure Wireless Phone also can be used as a
 regular wireless phone, both domestically and abroad, and can exchange secure voice and data communications with the Sectéra Wireline
 Terminal connected to an analog desktop phone. GSM (Global System for Mobile Communications) is a leading, worldwide, wireless
 telecommunications technology. The National Security Agency (NSA) has certified the secure phone’s ability to protect information classified
 Top Secret and below using Type 1 encryption algorithms available to authorized U.S. Government personnel.

           Note: This primary advantage SecurVoice© has over these Solutions is secure communications interoperability.


The Genesis Key, Inc.                                                                                                                   Confidential
Pricing Model




The Genesis Key, Inc.   Confidential
Contact Us

   For further information regarding SecurVoice©, please contact:

            The Genesis Key, Inc.
            355 I Street SW, Suite #401
            Washington, DC 20024
            203.912.5532 / 202.701.4900
            www.genesis-key.com
            www.securdigital.com
            sales@genesis-key.com




The Genesis Key, Inc.                                               Confidential

Mais conteúdo relacionado

Semelhante a SecurDigital Presentation V7

SVI Pitchbook
SVI PitchbookSVI Pitchbook
SVI PitchbookSVI2014
 
Elsight powerpoint presentation final (2)
Elsight   powerpoint presentation final (2)Elsight   powerpoint presentation final (2)
Elsight powerpoint presentation final (2)Reach Markets
 
Norwood at TechKnow 2017
Norwood at TechKnow 2017Norwood at TechKnow 2017
Norwood at TechKnow 2017Filament
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourYasser Mohammed
 
Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014Finjan Holdings, Inc.
 
Secur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm ShowSecur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm Showfmitchell
 
EmergentX Digital Asset Outlook 2022 - Consilience
EmergentX Digital Asset Outlook 2022 - ConsilienceEmergentX Digital Asset Outlook 2022 - Consilience
EmergentX Digital Asset Outlook 2022 - ConsilienceEmergentXDigitalAsse
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyMighty Guides, Inc.
 
Managed File Transfer for Dummies
Managed File Transfer for DummiesManaged File Transfer for Dummies
Managed File Transfer for DummiesLiberteks
 
Cybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data SecurityCybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data SecurityVertex Holdings
 
Everything Blockchain Presentation - October 2021
Everything Blockchain Presentation - October 2021Everything Blockchain Presentation - October 2021
Everything Blockchain Presentation - October 2021RedChip Companies, Inc.
 
Virtual Communications Corporation
Virtual Communications CorporationVirtual Communications Corporation
Virtual Communications CorporationPeter Bell
 

Semelhante a SecurDigital Presentation V7 (20)

WISekey presentation
WISekey presentation WISekey presentation
WISekey presentation
 
SVI Pitchbook
SVI PitchbookSVI Pitchbook
SVI Pitchbook
 
Elsight powerpoint presentation final (2)
Elsight   powerpoint presentation final (2)Elsight   powerpoint presentation final (2)
Elsight powerpoint presentation final (2)
 
Norwood at TechKnow 2017
Norwood at TechKnow 2017Norwood at TechKnow 2017
Norwood at TechKnow 2017
 
DeFi Technologies Deck - November 2021
DeFi Technologies Deck - November 2021DeFi Technologies Deck - November 2021
DeFi Technologies Deck - November 2021
 
DeFi Technologies Deck - September 2021
DeFi Technologies Deck - September 2021DeFi Technologies Deck - September 2021
DeFi Technologies Deck - September 2021
 
DeFi Technologies Deck - January 2022
DeFi Technologies Deck - January 2022DeFi Technologies Deck - January 2022
DeFi Technologies Deck - January 2022
 
DeFi Technologies Deck - March 2022
DeFi Technologies Deck - March 2022DeFi Technologies Deck - March 2022
DeFi Technologies Deck - March 2022
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 
DeFi Technologies Deck - April 2022
DeFi Technologies Deck - April 2022DeFi Technologies Deck - April 2022
DeFi Technologies Deck - April 2022
 
VTXNexGenNetDataFaster
VTXNexGenNetDataFasterVTXNexGenNetDataFaster
VTXNexGenNetDataFaster
 
Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014
 
Secur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm ShowSecur Digital Presentation 22jul10 Frm Show
Secur Digital Presentation 22jul10 Frm Show
 
DeFi Technologies Deck
DeFi Technologies Deck DeFi Technologies Deck
DeFi Technologies Deck
 
EmergentX Digital Asset Outlook 2022 - Consilience
EmergentX Digital Asset Outlook 2022 - ConsilienceEmergentX Digital Asset Outlook 2022 - Consilience
EmergentX Digital Asset Outlook 2022 - Consilience
 
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response StrategyTrustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
 
Managed File Transfer for Dummies
Managed File Transfer for DummiesManaged File Transfer for Dummies
Managed File Transfer for Dummies
 
Cybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data SecurityCybersecurity | Very Good Security: SaaS Platform for Data Security
Cybersecurity | Very Good Security: SaaS Platform for Data Security
 
Everything Blockchain Presentation - October 2021
Everything Blockchain Presentation - October 2021Everything Blockchain Presentation - October 2021
Everything Blockchain Presentation - October 2021
 
Virtual Communications Corporation
Virtual Communications CorporationVirtual Communications Corporation
Virtual Communications Corporation
 

SecurDigital Presentation V7

  • 1. Secur communications for all The Genesis Key, Inc. Presentation for Consumers November, 2009 The Genesis Key, Inc. Confidential
  • 2. SecurDigital, Inc. ”SecurDigital has upped the ante considerably here. In a sudden leap, this innovative new product has shaken off the complexity of unified communications and has taken the lead in terms of ease of use, security and interoperability. Starting with simple encryption techniques in a Java-based application, SecurDigital has introduced SecurVoice© Privacy Edition, a next-gen secure digital data transmission solution, which takes the focus away from hardware or firmware centric smartphone offerings and provides a Solution that is application platform, operating system, device and carrier independent. SecurVoice delivers encrypted voice, data or video transmission from any device to any device(s), with selectable encryption algorithms - allowing any companies to literally deploy “Secur Communications”. Bruce F. Magown, CEO SecurDigital, Inc. The Genesis Key, Inc. Confidential
  • 3. Do I need Security for my Cell phone? • Would you mind if you knew someone was listening to all of your calls on your home phone? • Did you know that your cell can be turned on in the off position and the microphone will pick up your private conversations at home? • Did you know that your phone is sending its signal numbers out to wireless towers 24/7? • Did you know the only way to shut down your cell phone is to pull out the battery? • Did you know that our government listens to every cell conversation on Route #95? • Did you know that if you put your bank or credit card number into your cell that it stays there forever? All information the phone receives s put on record. There is no way to dump that info. • If you are leading a Company or responsible for other peoples money that information buck stops with you, for you to be a secure source. • Did you know that even the Bluetooth ear bud could be listened to with a scanner? Imagine someone standing in the street with a hidden scanner and transmitter you are most intimate calls can and are being routed to the internet, especially You- Tube. • Did you know that most of the world is building their infrastructure on Maxi WiFi because it is less expensive and less time consuming to bury land cables? These citizens use their Phone for paying utilities and other bills over their cell phone. • Ask a young computer engineer still in college what does he do all his work on, a lap top or a cell phone, they will tell you that lap tops are from the stone age. They have phones that are more portable, less expensive and handle all pictures, and recordings, documents, letters and forms all installed in the cell phone…You need to see the world is changing in front of your eyes. • That person that says he does not see the need for personal cell security does not understand the world he is living in today… The Genesis Key, Inc. Confidential
  • 4. Disclaimer This presentation serves marketing purposes only. This presentation is made by The Genesis Key, Inc. (the "Company") solely for use at the road show presentation held in connection with the offering of shares of the Company and is strictly confidential. It is furnished to you solely for your information and may not be copied, distributed or otherwise made available to any other person by any recipient. Neither this presentation nor any copy of it may be taken or transmitted outside the United States or distributed outside the United States. Any failure to comply with this restriction may constitute a violation of the U.S. securities laws. The distribution of this document in other jurisdictions may also be restricted by law, and persons into whose possession this presentation comes should inform themselves about, and observe, any such restrictions. The facts and information contained herein are as up to date as is reasonably possible and are subject to revision in the future. None of the Company, Vantage Investment Group, Inc. or any of their parents or subsidiaries or any of such person's directors, officers, employees or advisors nor any other person makes any representation or warranty, express or implied as to, and no reliance should be placed on, the accuracy or completeness of the information contained in this presentation. None of the Company, Vantage Investment Group, Inc. or any of their parents or subsidiaries or any of their directors, officers, employees and advisors nor any other person shall have any liability whatsoever for any loss howsoever arising, directly or indirectly, from any use of this presentation. The same applies to information contained in other material made available at the presentation. While all reasonable care has been taken to ensure the facts stated herein are accurate and that the opinions contained herein are fair and reasonable, this document is selective in nature and is intended to provide an introduction to, and overview of, the business of the Company. Where any information and statistics are quoted from any external source, such information or statistics should not be interpreted as having been adopted or endorsed by the Company as being accurate. This presentation contains forward-looking statements relating to the business, financial performance and results of the Company and/or the industry in which the Company operates. These statements generally are identified by words such as "believes," "expects," "predicts," "intends," "projects," "plans," "estimates," "aims," "foresees," "anticipates,“ "targets," and similar expressions. The forward-looking statements, including but not limited to assumptions, opinions and views of the Company or information from third party sources, contained in this presentation are based on current plans, estimates, assumptions and projections and involve uncertainties and risks. Various factors could cause actual future results, performance or events to differ materially from those described in these statements. None of the Company or Vantage Investment Group, Inc. guarantees that the assumptions underlying such forward-looking statements are free from errors nor do they accept any responsibility for the future accuracy of the opinions expressed in this presentation. No obligation is assumed to update any forward-looking statements. By accepting this presentation you acknowledge that you will be solely responsible for your own assessment of the market and of the market position of the Company and that you will conduct your own analysis and be solely responsible for forming your own view of the potential future performance of the Company's business. This presentation does not constitute an offer or invitation to subscribe for, or purchase, any shares or other securities of the Company and neither this presentation nor anything contained herein shall form the basis of, or be relied on in connection with, any offer or commitment whatsoever in any jurisdiction in which such solicitation, offer or sale would be unlawful, nor shall part, or all, of these materials form the basis of, or be relied on in connection with, any contract or investment decision in relation to any securities. In particular, this presentation is not an offer for sale of securities in the United States. Securities may not be offered or sold in the United States absent registration or an exemption from registration under the U.S. Securities Act of 1933, as amended. Neither the Company nor any selling shareholder intends to register any securities of the Company outside the United States or to conduct a public offering of securities in any jurisdiction other than the United States. This presentation speaks as of September 14, 2009. Neither the delivery of this presentation nor any further discussions of the Company with any of the recipients shall, under any circumstances, create any implication that there has been no change in the affairs of the Company since such date. The Genesis Key, Inc. Confidential
  • 5. Agenda » Introduction » Management Team » Opportunity » Solution » Competition » Pricing Model » Summary The Genesis Key, Inc. Confidential
  • 6. Introduction » The Genesis Key, Inc., incorporated on October 7, 2008, in Dover, Delaware as a ”C” corporation. The Executive Team has been working together on security solutions for four (4) years prior to SecurVoice© being developed as a need for one of those projects championed by Steve I. Cooper, former CIO for White House and DHS, and now CIO of the FAA. » SecurVoice© target markets include; Banking, Financial Services and Brokerage Institutions, Attorney/Client privileged communications, the World Health Organization and HIPPA regulations for voice and data electronic transmission of patients health records between Hospitals, Doctors, Nurses and other long term Health providers, and now by law, the health monitoring systems needing secure communications to comply with Federal Regulations and Emergency Manager’s crisis coordination between all State and Local Police and Fire Departments. The company licenses using a SaaS or Enterprise software model with types for commercial or government. » Sales of cell phones are on pace to reach a billion annually by the end of the decade, when nearly 40 percent of the world's population will own a mobile handset, according to a Gartner report. Asian countries will continue to play a major role in increasing the number of cell phones in circulation to 2.6 billion by 2009, the research firm estimated in the report. Currently, 25 percent of all cell phones are sold in Asian countries; by decade's end, that number will be one in three. » Consumers today are unaware of threats to them as they use their smartphones. Personal conversations, data, banking and health information; all are available to undesirables if the consumer is not protected. » Genesis Key is making secure communications technology available at a retail price point that is device, carrier, operating system and application platform independent to the general marketplace. Note: This is unique in the world today. The Genesis Key, Inc. Confidential
  • 7. Management Team » The Genesis Key management and Advisors are comprised of experienced entrepreneurs and business professionals from the consumer, finance, technology, government and secure homeland industries. The management team possesses a breadth of functional experience in software product development, system and network integration, the marketing of emerging products, technologies, strategic partnering and corporate finance. Management and Board Advisors Bruce Magown, Founder, CEO, Treasurer Steven Cooper is a partner and founding member of Strativest, LLC. He previously held key, senior level technical and managerial information Mr. Magown is CEO of The Genesis Key, Inc., a multi-tenant technology positions in both the private and public sectors. . integration platform for SaaS application which provides complete In addition to 20 years experience in the private sector, Mr. Cooper integration Solutions – as a Service (www.interweave.biz). served at the highest levels of the United States Government. In InterWeave integrates CRM, Finance, ERP, eCommerce, 2002, he was appointed as a special assistant to the President and Subscription-based billing and Telephony applications with Web served as the senior director for information integration in the White Services Databases, etc., for customers in configurable form. House Office of Homeland Security. This was followed in 2003 by his Additionally, Mr. Magown served as the Vice President of the appointment as the first chief information officer at the newly formed Strategic Alliance of Sun/Netscape and built Netscape Professional Department of Homeland Security. In this position, Mr. Cooper had Services to over $200m in four years. responsibility for all information technology assets supporting 190,000 Steve Garrett, Founder, Chairman of the Board, Secretary personnel and 22 agencies. . Mr. Garrett founded The Genesis Key, Inc. while working to solve Norman Byers – Mr. Byers is the managing partner and a founding communication challenges for another business of his: PGC member of Strativest, LLC. He formerly headed Byers Consulting, a Consortium (www.phoenixgenesiscorp.com). He brings over 40 Northern Virginia based consulting firm advising companies accessing years of deep business experience and being CEO of public federal, state and local markets. Mr. Byers has extensive international companies. He has been involved in directing leading edge business experience, having founded joint ventures in Asia and the technology Start-up Companies; providing Executive and Financial Middle East and establishing numerous strategic partnerships Guidance, Marketing, and Sales Management, Corporate Strategic throughout Europe, South America, Asia and the Middle East. Planning, Systems Organization, Security and Efficiency. James McKay - Deputy Chief Financial Officer of the Justice Dept. & first Inspector General of the ICC Clifford Bragdon - Dean of Florida Institute of Technology and Chairman of the Board of the Global Center of Preparedness USAF Major General Eric Rosborg – Chief, Office of Defense Cooperation Turkey, U.S. European Command, Ankara, Turkey, retired. Managed all aspects of security assistance and security cooperation programs necessary to sustain the military-to-military relationship between the United States and Turkey. The Genesis Key, Inc. Confidential
  • 8. Opportunity » Smartphones are enjoying brisker than expected growth, according to a new report from Gartner. The firm's recently released "mobile terminals" market study projects that shipments of mobile phones in general will surpass 1 billion units in 2009, and that "Smartphones" will reach the 200 million mark one year earlier, in 2008. Gartner has boosted its previous projection for mobile phone sales in 2005 "significantly" to 779 million units, according to Ben Wood, Research Vice President of Gartner for Mobile Terminals, a 16 percent increase over 2004. Among other projections, the report says that more than 100 million 3G phones will be sold in 2006, and that the Indian market to overtake the Chinese market in terms of annual sales in 2009. As for the entire Asia/Pacific segment of the mobile phone market, it represents 25 percent of the worldwide market today, Gartner says, predicting that this will increase to 33 percent by 2009. "The world's appetite for mobile phones has exceeded even the most optimistic expectations," said Wood. "Mobile phones could go on to be the most common consumer electronics devices on the planet." Gartner estimates there will be 2.6 billion mobile phones in use by the end of 2009. Smartphones fastest growing category "Smartphone sales broke all records in the first quarter of 2005 and we expect them to double year on year to 2006," says Roberta Cozza, principal analyst at Gartner. And a deeper analysis of the forecast, she explains, "shows that Smartphones are the fastest growing category of device.“ According to Gartner, Windows Mobile Smartphones almost doubled their market share in Q1 2005 over Q1 2004, although that share is a minority one. Upwards of 76 percent of Smartphones run the Symbian OS, according to Gartner, with Linux a distant second at around 14 percent, and Palm OS and Windows Mobile in a virtual tie with 4.6 and 4.5 percent, respectively. Operating System Adoption The Genesis Key, Inc. Confidential
  • 9. Solution Overview SecurVoice© is ultra-strong encryption software. The internal software on your cell phone converts your voice in real-time into encrypted data which is then sent over your carriers infrastructure to the SecurVoice© Enterprise Server where it is de-crypted. It is then re-encrypted and sent over your carrier’s infrastructure the receiving cell phone where it is de-crypted and is converted back to voice. SecurVoice© also features a dual-layered encryption schema which provides full protection against covert listening devices. You may select different encryption algorithms. For example, your outbound conversation may be AES 128 encryption, while your callers inbound conversation may be elliptical curve; making listening to your conversation impossible The Genesis Key, Inc. Confidential
  • 10. Solution Detail » SecurVoice© Privacy Edition is a completely new wireless communication solution and architecture which provides secure communications interoperability with any cell, satellite, walkie-talkie, or VoIP phone system. You can download the 38k Java app from our secure locations world-wide and follow the simple instructions to install. How it Works Solution Overview Key Features The Java app communicates directly ONE-TOUCH SWITCHING • HIPPA compliant privacy-grade strong encryption with our SecurVoice© Enterprise Server BETWEEN PRIVACY AND key (AES (128) asymmetric encryption) plus application as a hosted option or may STANDARD COMMUNICATIONS additional encryption combinations to provide a be resident on your servers. very unique Solution WMS AND VOIP SECURE Additionally, we provide internet virus • Data is encrypted when it leaves the sending COMMUNICATION OPTION device and is de-encrypted by the server. It is then and hacker protection with a firewall INTUITIVE, USER-FRIENDLY re-encrypted (with possible other encryption from CyberSoft. INTERFACE selection) and sent to the receiving device and The solution is operating system, decrypted application platform, device and carrier AVAILABLE TO PURCHASE AND • Software only Solution. No additional hardware independent. DOWNLOAD ONLINE required SOFTWARE BASED SOLUTION – • Implemented on regular smart phones and GSM NOT HARDWARE cellular networks with circuit-switched data service • Full duplex communications • Superior audio quality and ultra low latency • Resides on regular cell phones. Neither the encryption process nor the device is perceived by third parties • The user may update the cell phone firmware or operating system. The cell phone keeps all its original features. The Genesis Key, Inc. Confidential
  • 11. Solution Interoperability Complete Inter-operability. Device, Carrier, Application Platform & Operating System Independent The Genesis Key, Inc. Confidential
  • 12. Competition » In our competitive market research, we have not found any comparative for “software only” secure communications solutions for data, voice and video. Potential competitors are typically in either “Hardware Specific” or “Firmware Specific” categories. http://www.koolspan.com/ Commercial type on hardware system The KoolSpan solution is available today in an Ethernet-based network appliance and client-side Smart Card that plugs into a USB port. Along with streamlined device integration capabilities, KoolSpan delivers a security architecture greatly reducing the effort required for user/network security administration. KoolSpan also is highly suitable for a large range of OEM and embedded systems supporting critical enterprise voice, wireless and data networking applications. http://www.cellcrypt.com/?gclid=CLzViqvJu5YCFQOcFQodXWyeKw Commercial type on hardware system Secure calls can be completed from one mobile device to another mobile device, between a mobile and a landline, or from landline to landline. The architecture requires all secure calls to be routed through a Cellcrypt Switch, which can be publicly or privately hosted. The calls passing through the switch are not decrypted, ensuring complete privacy. http://www.snapdefense.com/pages.php?module=15&cat=12&incat=0 Snapcell is a patented micro-adapter used for secure point-to-point cellular communications over any GSM frequency (850/900/1800/1900). Snapcell is compatible with popular Ericsson T-Series phones including T28, V800, K500i, T637 and several others. Attach Snapcell onto the handset and enjoy military-strength security at toll-voice quality! http://www.sigillu.com/index.html We are pleased to announce the 3rd generation of our secure phones, with improved audio quality, enhanced ultra low latency, and support for the most modern Nokia™ phones. http://www.gdc4s.com/content/detail.cfm?item=97aef0a4-96e4-4ab2-b33b-eb832c4bb4c2 The Sectéra® Wireless GSM® Phone provides end-to-end high assurance secure voice and data communications for commercial GSM wireless networks operating in the 900/1800/1900 MHz bandwidths worldwide. The Sectéra Secure Wireless Phone also can be used as a regular wireless phone, both domestically and abroad, and can exchange secure voice and data communications with the Sectéra Wireline Terminal connected to an analog desktop phone. GSM (Global System for Mobile Communications) is a leading, worldwide, wireless telecommunications technology. The National Security Agency (NSA) has certified the secure phone’s ability to protect information classified Top Secret and below using Type 1 encryption algorithms available to authorized U.S. Government personnel. Note: This primary advantage SecurVoice© has over these Solutions is secure communications interoperability. The Genesis Key, Inc. Confidential
  • 13. Pricing Model The Genesis Key, Inc. Confidential
  • 14. Contact Us For further information regarding SecurVoice©, please contact: The Genesis Key, Inc. 355 I Street SW, Suite #401 Washington, DC 20024 203.912.5532 / 202.701.4900 www.genesis-key.com www.securdigital.com sales@genesis-key.com The Genesis Key, Inc. Confidential